In the days before the Internet, everyone packed up for the day and went home at 5 p.m. – leaving work behind until the following morning. However, with today’s 24/7 Internet access, the end of the work day is no longer so clearly defined. Technological advances like smart devices and cloud storage have also paved the way for employees around the world to stay connected, work more flexible schedules and be more productive at times that make sense for their lives, not to mention access important documents and files while away from their desk and even on the go.

Unfortunately, many employees may not realize that their constant connectivity and willingness to use smart devices to multitask between work and play can leave them and their employers vulnerable to data theft. The 2013 Norton Report found that nearly one-fourth (24 percent) of online file-storage site users store and share both personal and work documents and files on these sites. If cybercriminals gain access to these multi-use file-storage accounts, they would not only gain access to personal information, which could then be used to target them for cyberattacks or sold on the black market, but would also grant them access to valuable business information as well.

Keeping all of your information protected, be it personal or professional, is simple and requires a relatively small effort in comparison to the potential dangers you will thwart. The following three tips will help keep you safe whether you’re working, playing or both.

1.     Manage how you share:  According to the 2013 Norton Report, nearly one-fifth of online file-storage users say they use the sites to share work-related information with friends (18 percent) and family (21 percent), potentially jeopardizing sensitive company information.  Consider using an online file sharing site that allows you to manage exactly who has access to which files and that provides a secure way to share such as Norton Zone.

2.     Employ passwords: Passwords are worth the investment when it stops a cybercriminal in their tracks. Develop unique and complex passwords for each of your devices and accounts. If a hacker does find their way into your social network account, it is far more disastrous if they have also gained access to your corporate email and bank accounts.

3.     Hire security:  A comprehensive security suite can be your strongest line of defense against threats. Install a product that can protect your PC, laptop, tablet and mobile all-in-one, such as Norton 360 Multi-Device, ensuring you have protection no matter where you connect.

While the advantages and disadvantages of being constantly connected are regularly up for debate, one thing remains indisputable – being connected puts you at risk for cyberattacks. Just stick to a personal security policy, including the above tips, and you can embrace on-the-go connectivity with the confidence that your personal information, and your companies private information, will never be at risk because of you.